Assets and Threats: Quiz 4

Assets and Threats: Quiz 4

Professional Development

29 Qs

quiz-placeholder

Similar activities

A+ - 13B - Install and Configure Applications

A+ - 13B - Install and Configure Applications

Professional Development

25 Qs

Set-Up Computer Server

Set-Up Computer Server

Professional Development

25 Qs

CloudBinary_Jenkins_Quiz- 1

CloudBinary_Jenkins_Quiz- 1

Professional Development

25 Qs

Android Quiz

Android Quiz

10th Grade - Professional Development

25 Qs

AWS IAM and S3

AWS IAM and S3

Professional Development

31 Qs

External threats

External threats

KG - Professional Development

26 Qs

IoT Quiz - 1

IoT Quiz - 1

University - Professional Development

25 Qs

CompTIA Security+ Quiz

CompTIA Security+ Quiz

Professional Development

25 Qs

Assets and Threats: Quiz 4

Assets and Threats: Quiz 4

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

29 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data integrity relates to the accuracy and consistency of information. This is known as non-repud_____________, the concept that authenticity of information can't be de___________.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To avoid the risk of hash collisions, functions that generated longer values were needed. MD5's shortcomings gave way to a new group of functions known as the sec________ has_________ algor_________, or SHAs.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Five fun__________ make up the SHA family of algorithms:

SHA-1

SHA-224

SHA-256

SHA-384

SHA-512

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A rainbow table is a file of pre-generated hash values and their associated plaintext. They’re like dictio_________ of weak passwords. Attackers capable of obtaining an organization’s password database can use a rainbow table to compare them against all possible values.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Salting is an additional safeguard that's used to strengthen hash functions. A salt is a random str__________ of characters that's added to data before it's hashed. The additional characters produce a more unique hash value, making salted data resilient to rainbow table attacks.

For example, a database containing passwords might have several hashed entries for the password "password." If those passwords were all salted, each entry would be completely different. That means an attacker using a rainbow table would be unable to find matching values for "password" in the database.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?